• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

To authors of the 'Security Patterns' book

 
Ranch Hand
Posts: 209
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Christopher, Ramesh and Ray,

I wanted to get a book that exclusively deals with the security matters in the web environment for long time. I've just checked the Amazon's reviews on your book and everyone is just loving it. Looks like you've done a great job.

Could you please tell us a bit about your background. Where did you acquire all this knowledge on the security matters? How did you come up with 23 security design patterns?


Kind regards.
[ January 12, 2006: Message edited by: Alex Sharkoff ]
 
Greenhorn
Posts: 23
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Alex,
I have ended up doing application security in various forms for the past 10 years. I started out in security in the Internet Lab research group at Thomson Labs. I then transitioned to product development for another Thomson company. After that I was at Sun Microsystems for 5+ years in the Java Center group of Professional Services. There I consulted to many different customers large and small implementing security in large enterprise applications for financial istitutions to working on Jini security for a Navy project.
While at Sun, I worked alongside John Crupi and Danny Malks. It was from their Core J2EE Patterns book that we got the idea to write Core Security Patterns. John had pressured me for some security patterns to add to the second edition of CJP. I completed a chapter but was too late to fold it in. After Sun, I went to a small consulting company and built a large collection application for the U.S. Treasury. A lot of the patterns and best practices came out of that experience. During that time Ramesh and I met and he really got me to start to the book and kept me at it.
In general, my experience is all hands on, not theoretical. You will find a lot of valuable best practices, pitfalls, and reality checks. Much of this is not just our knowlege, but the collective knowlege of many developers and consultants we have worked alongside over the last 10 years.
 
Alex Sharkoff
Ranch Hand
Posts: 209
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Thanks a lot, Christopher.
 
To do a great right, do a little wrong - shakepeare. twisted little ad:
a bit of art, as a gift, that will fit in a stocking
https://gardener-gift.com
reply
    Bookmark Topic Watch Topic
  • New Topic